Shellcode loader based on indirect syscall
☆22Feb 9, 2025Updated last year
Alternatives and similar repositories for AxiomLoader
Users that are interested in AxiomLoader are comparing it to the libraries listed below
Sorting:
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Mar 6, 2025Updated 11 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- ☆44Jan 22, 2026Updated last month
- SwitchToOpen - The open source shift☆305Nov 21, 2025Updated 3 months ago
- blog☆23Mar 17, 2025Updated 11 months ago
- A simple PoC crypto ransomware in Python☆19Jul 31, 2016Updated 9 years ago
- Challenges du 404 CTF☆25Feb 16, 2023Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆129Dec 15, 2025Updated 2 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆148Sep 4, 2025Updated 5 months ago
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated 11 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆116Feb 17, 2026Updated last week
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Dec 1, 2025Updated 3 months ago
- Lsass dumper evading (all ?) EDR detection☆49Nov 10, 2025Updated 3 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆42Apr 7, 2025Updated 10 months ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Updated this week
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- ☆39Oct 18, 2024Updated last year
- Esta es una extensión del proyecto original de Avilla Forensics☆12Nov 18, 2025Updated 3 months ago
- Tool for bypassing logins vulnerable against SQL injection☆46Apr 3, 2024Updated last year
- Shell Utils is an educational framework designed to make shell programming accessible and powerful. It is the result of extensive work ov…☆13Feb 22, 2026Updated last week
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated 2 months ago
- A comprehensive automation script for penetration testing and reconnaissance.☆43Jul 29, 2024Updated last year
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- ☆12Sep 2, 2016Updated 9 years ago
- Une formation Ansible complète☆81Jul 5, 2025Updated 7 months ago
- ☆12Oct 10, 2024Updated last year
- A curated collection of amazing software, libraries, documents, books, resources, and other cool security-related content.☆13Nov 13, 2024Updated last year
- ☆12Jul 9, 2024Updated last year
- ☆15Apr 10, 2025Updated 10 months ago
- A repository dedicated to deliver a comprehensive set of tools for integration and convenient use of Kaspersky Threat Intelligence servic…☆21Dec 17, 2025Updated 2 months ago
- ☆14Sep 1, 2024Updated last year
- Pentesting tool to automate common op tasks and organize discovered data.☆13Dec 23, 2025Updated 2 months ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- hubspot mcp server☆12Apr 1, 2025Updated 11 months ago
- Multi-threading Leaks/Intelligence file parser☆15Feb 16, 2026Updated 2 weeks ago